Blind image deconvolution is ................ (A) Combination of blur identification and image restoration (B) Combination of segmentation and classification (C) Combination of blur and non-blur image (D) None of the above

1 Answer

Answer :

(A) Combination of blur identification and image restoration 

Related questions

Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Description : The first step in the process of product promotion refer to a) Diversification b) Identification c) Segmentation d) Advertising

Last Answer : c) Segmentation

Description : The most common user identification technique is via? A. Sessions B. Cookies C. Segmentation D. page views

Last Answer : B. Cookies

Description : State true of false. i) With paging, each process is divided into relatively small, fixed-size pages. ii) Segmentation provides for the use of pieces of varying size. A) Partition management B) Memory management C) Disk management D) All of the above

Last Answer : B) Memory management

Description : ..................... provides a larger sized of virtual memory but require virtual memory which provides multidimensional memory. A) Paging method B) Segmentation method C) Paging and segmentation method D) None of these

Last Answer : B) Segmentation method

Description : Working set model is used in memory management to implement the concept of (A) Swapping (B) Principal of Locality (C) Segmentation (D) Thrashing

Last Answer : (B) Principal of Locality

Description : Discovery of cross sales opportunities is called as ............... (A) Association (B) Visualization (C) Correlation (D) Segmentation 

Last Answer : (A) Association

Description : Based on the identification of objectives, input, output and file content, the vital document is called … A) System Definition B) System Document C) System Requirement Document D) System Subject

Last Answer : B) System Document

Description : Software safety is a ................... activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire ... monitoring and management (B) Software quality assurance (C) Software cost estimation (D) Defect removal efficiency

Last Answer : (B) Software quality assurance

Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum

Last Answer : (A) identification

Description : Which of the following fields in IPv4 datagram is not related to fragmentation? (A) Type of service (B) Fragment offset (C) Flags (D) Identification

Last Answer : (A) Type of service 

Description : Parts A, B, C and D of the human eye are shown in the diagram. Select the option which gives correct identification along with its functions characteristics. (a) C-Aqueous chamber-Reflects the light which does not ... , i.e., rods and cones. (d) B - Blind spot-Has only a few rods and cones.

Last Answer : (c) A - Retina - Contains photoreceptors, i.e., rods and cones.

Description : Given a Non-deterministic Finite Automation (NFA) with states p and r as initial and final states respectively transition table as given below  The minimum number of states required in Deterministic Finite Automation (DFA) equivalent to NFA is (A) 5 (B) 4 (C) 3 (D) 2

Last Answer : (C) 3 

Description : What is the process of breaking an image into groups? a) Edge detection b) Smoothing c) Segmentation d) None of the mentioned

Last Answer : c) Segmentation

Description : Biosystematics aims at (a) the classification of organisms based on broad morphological characters (b) delimiting various taxa of organisms and establishing their relationships (c) the ... (d) identification and arrangement of organisms on the basis of their cytological characteristics.

Last Answer : (b) delimiting various taxa of organisms and establishing their relationships

Description : Crescent-shaped vibrating blur on the right-middle of my vision... Should I be worried?

Last Answer : I’d get it checked, blurred vision and other, sudden onset vision problems could be a sign of something more serious like a mini-stroke or? Are you under a lot of stress right now? it might be stress related as well, never the less we can’t diagnose anything here with authority, get it checked out.

Description : How can you make an orbiting blur in photoshop?

Last Answer : answer:it's hard to tell what you need without some sort of picture reference. But maybe you could do something like I have done here. These were two photos I did for a company ... .graphic-design.com/Photoshop/motion_blur/index.html or http://www.photoshopessentials.com/photo-effects/motion-blur/

Description : Hey, guys, am I going crazy? Everything is starting to blur together.

Last Answer : Triumvirate? More like a TIMvirate, amirite?

Description : I am a tale in childrens' minds. I keep their secrets and share them inside. I blur their thoughts into fantasies kept Like a canvas of art or a submarine depth. Though an illusion, it occurs every night; I ... I give them a fright. Nor good or bad, but It's interesting to tell.What am I? -Riddles

Last Answer : I am a dream.

Description : Differentiate between Blur and Sharpen tool -Technology

Last Answer : Blur ToolSharpen ToolBlur mode causes each pixel affected by the brush to be blended with neighbouring pixels, thereby increasing the similarity of pixels inside the brushstroke areaSharpen mode causes each ... Sharpen mode, the tool works by increasing the contrast where the brush is applied.

Description : Do I see less with my eyes ? I haven't seen or seen anything far away for months. It looks cloudy. Again I see blur in low darkness. How to get rid of it ?

Last Answer : : This is due to lack of vitamin C. It is also known as night blindness. So we need to eat foods rich in vitamin A and vitamin C such as raw peppers , vegetables , fruits , pumpkins , carrots , ... You have to drink more water. Moreover , you have to wash your eyes with cold water 5 times a day.

Description : The images and Text on my Laptop is becoming blur, how can I solve this?

Last Answer : First, try adjusting manually the display or text settings at the control panel section or you may want to change the theme as well. If it does not work, you can format or reset your computer. Finally, if none of the above troubleshooting steps worked, consult a technician.

Description : Consider the two class classification task that consists of the following points: Class C1: [1 1.5] [1 -1.5] Class C2: [-2 2.5] [-2 -2.5] The decision boundary between the two classes using single perceptron is given by: (A) x1+x2+1.5=0 (B) x1+x2-1.5=0 (C) x1+1.5=0 (D) x1-1.5=0

Last Answer : (C) x1+1.5=0 

Description : In Data mining, classification rules are extracted from .............. (A) Data (B) Information (C) Decision Tree (D) Database

Last Answer : (C) Decision Tree 

Description : In java, string is a ............. A) primitive data type B) abstract data type C) combination of boolean D) None of the above

Last Answer : B) abstract data type

Description : ............. is a combination of two of more attributes used as a primary key A) Composite Key B) Alternate Key C) Candidate Key D) Foreign Key

Last Answer : A) Composite Key

Description : The combination of ……………. And ………….. is often termed the local address of the local portion of the IP address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number D) All of the above

Last Answer : C) Subnet number and host number

Description : The combination of ........... and ............ is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number.

Last Answer : C) Subnet number and host number.

Description : For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as : (A) Neighbour Set (B) Strong Entity Set (C) Owner entity set (D) Weak Set

Last Answer : (C) Owner entity set 

Description : The combination of an IP address and a port number is known as ................... (A) network number (B) socket address (C) subnet mask number (D) MAC address

Last Answer : (B) socket address

Description : What non-salon product performs best for hair restoration for women?

Last Answer : I would reccomend eithe Suave Professionals or Pantene they both perform very well for me. They both offer many diffrent formulas for diffrent hair issues like the salon stuff does too! Bosley has one of the best hair restoration for women. You can check out their services at www.Bosley.com.

Description : The typical elements of process image are ..................... i) User data ii) System Data iii) User program iv) System stack A) i, iii and iv only B) i, ii, and iv only C) ii, iii, and iv only D) All i, ii, iii, and iv

Last Answer : A) i, iii and iv only

Description : ............. tag is used to embed image in a webpage. A) B) C) D) None of the above

Last Answer : A)

Description : If f(x, y) is a digital image, then x, y and amplitude values of f are (A) Finite (B) Infinite (C) Neither finite nor infinite (D) None of the above

Last Answer : (A) Finite

Description : The number of distinct binary images which can be generated from a given binary image of right M × N are (A) M + N (B) M × N (C) 2M + N (D) 2MN

Last Answer : (D) 2MN

Description : Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is (A) n × 8 MB (B) n / 8 MB (C) (1024 × 1024) / 8 MB (D) 1024 MB

Last Answer : (B) n / 8 MB

Description : The refresh rate above which a picture stops flickering and fuses into a steady image is called .................. (A) Crucial fusion frequency (B) Current frequency fusion (C) Critical fusion frequency (D) Critically diffused frequency

Last Answer : (C) Critical fusion frequency 

Description : An image is 1024∗800 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 10-Mbps Ethernet ? (A) 196.6 seconds (B) 19.66 seconds (C) 1.966 seconds (D) 0.1966 seconds

Last Answer : (C) 1.966 seconds

Description : What steps shall be required to rotate an object about the point P1 (as shown in fig.1) and its placement such that what was at P1 is now reduced and is at P2 (as shown in fig.2). I. Translate P1 to origin II. ... (A) I,II and III (B) II,III and IV (C) I,III and IV (D) All of the above

Last Answer : Answer: Marks given to all

Description : The transformation matrix required for conversion of CMY colour model to RGB colour model is given as

Last Answer : Answer: C

Description : Consider the following ER diagram:  The minimum number of tables required to represent M, N, P, R1, R2 is (A) 2 (B) 3 (C) 4 (D) 5

Last Answer : (A) 2 

Description : Consider the formula in image processing RD = 1 - (1/CR) Where CR = n1/n2 CR is called as compression ratio n1 and n2 denotes the number of information carrying units in two datasets that represent ... . (A) Data Compression (B) Data Redundancy (C) Data Relation (D) Data Representation

Last Answer : (B) Data Redundancy

Description : What are the final values of Q1 and Q0 after 4 clock cycles, if initial values are 00 in the sequential circuit shown below: (A) 11 (B) 10 (C) 01 (D) 00

Last Answer : (D) 00

Description : Given the following statements :  S1 : The subgraph-isomorphism problem takes two graphs G1 and G2 and asks whether G1 is a subgraph of G2.  S2 : The set-partition problem takes as input a set S of numbers and ... S1 is P problem and S2 is P problem. (D) S1 is P problem and S2 is NP problem.

Last Answer : (B) S1 is NP problem and S2 is NP problem.

Description : The initial basic feasible solution of the following transportion problem : then the minimum cost is (A) 76 (B) 78 (C) 80 (D) 82

Last Answer : (A) 76

Description : Given an image of size 1024 × 1024 pixels in which intensity of each pixel is an 8-bit quality. It requires ............... of storage space if the image is not compressed. (A) one Terabyte (B) one Megabyte (C) 8 Megabytes (D) 8 Terabytes

Last Answer : (B) one Megabyte

Description : Consider the Graph shown below : This graph is a ............... (A) Complete Graph (B) Bipartite Graph (C) Hamiltonian Graph (D) All of the above

Last Answer : (C) Hamiltonian Graph

Description : Let A and B be two fuzzy integers defined as: A={(1,0.3), (2,0.6), (3,1), (4,0.7), (5,0.2)} B={(10,0.5), (11,1), (12,0.5)} Using fuzzy arithmetic operation given by (A) {(11,0.8), (13,1), (15,1)} ( ... ,0.2)} (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Last Answer : (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Description : Consider the following transportation problem: The initial basic feasible solution of the above transportation problem using Vogel's Approximation Method(VAM) is given below: The solution of the ... degenerate solution (B) is optimum solution (C) needs to improve (D) is infeasible solution

Last Answer : (B) is optimum solution

Description : The redundancy in images stems from: (A) pixel decorrelation (B) pixel correlation (C) pixel quantization (D) image size

Last Answer : (B) pixel correlation